article thumbnail

How Keeping Track of Microsoft’s Product Plans Can Keep Your Network Secure

LAN Infotech

Outdated applications can provide a backdoor for ransomware attacks, malware, and viruses. So they’ve outlined not only upcoming product retirements and phase-out plans for 2023 but also 2024, 2025, 2026, and 2027. If you look at the list for 2027 , it’s not nearly as robust as that for 2023.

Audit 98
article thumbnail

Data Protection Predictions from Experts for 2025

Solutions Review

Once migration becomes urgent, especially as we approach deadlines such as SAPs 2027 cutoff to move to S/4HANA, the rush to transition will lead to mistakes such as leaving remaining vulnerabilities in the code or data you are bringing over. Attackers can now use AI to generate complex, targeted phishing, deepfakes, and adaptive malware.

article thumbnail

33 Data Protection Predictions from 19 Experts for 2024

Solutions Review

Furthermore, AI-powered malware could adapt and evolve in real time, making it more challenging for traditional antimalware detection systems to keep up.” According to Gartner, 50 percent of critical infrastructure applications will reside outside of the public cloud through 2027.